Alex Kihika Mburu’s complaint on the Equity Bank alleged “3DJ” (Distract, Delay and Deny Justice) strategy on $16,000 complaint calls for personal attention of CEO Mr James Mwangi’s

Be Social. Share this Article

My name is Alex kihika Mburu and I have been an Equity Bank customer since 2004 whereby I opened an ordinary kenya shillings account and opened a US Dollar account on the 29th November 2011.This fraud was successful as it was an internal fraud by  well seasoned fraudsters working for Equity Bank employees  with vast experience in phishing and fake emails. 

I was kept in the darkness from knowledge of the fraudulent attempts and transactions on my funds from January 2014 until April 2014 as Equity employees are the fraudsters who cunningly ignored my complaints as well as requests for bank statements.The instructions were given through fake emails whereby the bank have denied physical confirmation of the emails and email headers.

Equity Bank has refuted compensation based on the email indemnity I signed in the year 2012 while they have acknowledged the emails emanated from Uganda while the customer was in Afghanistan.The bank has acknowledged there is one fake email purporting to be from me that was executed  by the bank.Yet they claim email indemnity to deny me compensation.If they are sure of their emails and email headers why deny physical confirmation which I believe emanated from Equity Center rather than Uganda.

An argument with the Head of IT about a  phishing fake email allegedly from a bank employee , was all it took to be trained by Equity Bank on email headers and authentication.In ten minutes I knew about fake emailers ,email headers and email header analyzers.Now if a bank customer can be trained in email authentication ,what about bank employees ?Plus this is not the first fraud case involving fake emails as security officers confessed to me a catholic priest was once defrauded through fake emails.

If email authentication was applied by the Equity Bank employees ,this fraud would have been detected but the officers in charge of these two fraudulent funds transfers are the fraudsters as evidenced in this letter.You will comprehend that Equity Bank knew I did not receive relevant emails from the  bank and the bank anticipated the fake emails I would receive one day prior.This letter displays lies , collusion, apprehension ,negligence,premonitions ,predictions and gross blunders by Equity bank employees in charge of these two funds transfers.

From the email logs provided by the Equity Bank Forensics Team, there over fifteen emails allegedly from the bank to my email address I did not receive and over fifteen emails I did not send to the bank.Also I received over seven fake emails comprising of four phishing emails,two with fake bank statements and two with misleading bank information.

The most incriminating email to the bank is one  imaginary email allegedly from me to Equity Bank that does not exist in the email logs.This email allegedly from me to the bank on the 3rd April 2014 was allegedly in form of a reply to me by one Senior Officer namely Christine Bonface. This imaginary email is a morphed email of the complaint email I sent to the bank on the 2nd April 2014.This imaginary email was added some lines to the email I sent on the 2nd April 2014 claiming that I was complaining of an issue but the bank solved the issue on the 18th February 2014. Peruse through the letter as I  have explained everything in detail .

I shared the same password for my email address with my internet banking password. As a DOD employee we had many passwords for many security features around the base.The e-banking Department are the likely hackers who guessed my password but Equity Bank has denied physical confirmation of the emails and email headers as they surely know the emails allegedly from me to the bank are fake and those not fake emanated from Equity Center/Kenya and not Uganda.

I had three hour meeting with General Manager Miringu Ng’ang’a and Head of Security Gerald Munyiri and we came to an agreement that they were also dedicated to this case and  they wanted to know the fraudsters behind this fraud.We agreed orally that they will designate one day for the physical confirmation of the email headers and retrieval of the email headers.All it will take is one employee like Deputy Head of Diaspora Banking who have access to emails of employees under her command.Only one laptop,one office and in one hour will confirm the emails and email headers.

On the designated day I was accompanied by BFID Investigating Officer and Cyber Crime Officer. Equity Bank security officers denied access to these emails and requested for a court order.After three weeks of waiting they were served with a court order by the BFID IO.After the court order was served some weeks passed and when we finally went for the email headers they claimed some employees were relocated and only the Cyber Crime Officer and IO are allowed. 

Upto now the Cyber Crime Officer claims some email headers have not been provided meaning instead of retrieving the email headers himself ,he was handed prepared email headers which are very easy to forge, as you just change the email addresses and time stamps and give to Cyber Crime Officers.Also from the Cyber Crime data handed to Cyber Crime officer there are some missing email headers, irrelevant email headers and tampered email headers. This is the reason we requested for physical confirmation of the emails and email headers. 

3DJ – DISTRACT DELAY AND DENY JUSTICE   

This tactic is applied by Equity Bank and other banks to kill cases that are compromising senior officers of the bank as the offenders.BFID claims 3DJ thrives on killing time and  plays on the victims like disc jockeys until they give up their cases.Only die hard fraud victims persevere to the end and if the fraud is below 200,000 thousand kenya shillings ,by the end  of three months you will definitely give up. 

This fraud case is the  best scenario of 3DJ at its best and what banking fraud victims go through once they lodge complaints to the banks especially Equity Bank.

  • First- the Security Department of Equity Bank comprises of former Banking Fraud Investigation Department employees, who are not trained in Cyber Crime Training and Investigation.Meaning a bank’s forensic expert must be present and bank’s security officer.One of them will always come up with an excuse to postpone the investigation for another meeting.
  • Second -any information demanded by the complainants will be denied unless one be accompanied by a lawyer or a BFID IO.
  • Third- they will lay blame  to anything associated with the fraud other than the Bank.
  • Fourth-if you don’t fall to their conclusions they start evading you and your calls and start pacifying you with stories of people defrauded millions of shillings which compared with the money you have been defrauded will  render and make your case  feel like a nuisance and unimportant to the bank.
  • Fifth -you will head to BFID  for further investigation.You will be advised to write a letter directed to BFID Director concerning your fraud.
  • Sixth -In a week you will be handed an investigator with no cyber crime training.
  • Seventh-For weeks the investigating officer will be busy until you complain to the BFID Director.
  • Eighth -After two months and numerous visits you will realize the BFID department is overwhelmed with banking fraud cases and only a few officers trained in Cyber Crime , who mostly are handed the biggest fraud cases amounting to hundreds of millions.
  • Ninth -when you head to Equity Center with your investigating officer ,the officer will insist you involve the cyber crime office of the CID whereby a letter will have to be written by the investigating officer or BFID Director requesting for a Cyber Crime officer to handle the cyber crime data provided by the bank .
  • Tenth -if you pray and play hard by following up with the cyber crime office , weeks will pass by until you are assigned a cyber crime officer.
  • Eleventh -the cyber crime officer who is also busy with cases will accompany you to the bank,only for the security department to dismiss both of you as the BFID investigating officer must accompany you.
  • Twelfth- after weeks trying to organize for both Officers who are busy with cases ,you will find one is  available on this particular day while the other is only available on a different day meaning you will have to wait for weeks when they are both free to accompany you to the bank.
  • Thirteen, when you finally  get both of them ,they will accompany you to Equity Center where you will be advised the Head of IT must always be present when Equity Bank is providing fraud data  to the police.Now the Head of IT and Security Officer from the bank will have the following excuses ready so as to postpone  the meetings:
  • The first meeting will be postponed as you must be accompanied by BFID Investigating Officer assigned the job by BFID.
  • The second meeting, IT personnel will claim that he was not informed of this meeting and he is very busy with a project .
  • The third meeting  will be postponed on the claim you are late .You will make sure that the next time the Head of IT is informed and he will give an appointment early in the morning between 9:00 PM and 10:00 PM.The investigating officers will arrive after 11:00 PM.The Head of IT will claim you are late and as of now he is busy.
  • The fourth meeting  ,the security officer in charge of the internal investigation for the bank will not be available  due to an emergency.Now you will request for another security officer for this meeting ,but no other security officer will agree to cover the bank’s security officer.You will head to the Head of Security ,where you will request that you be assigned a temporarily security officer ,that the Cyber Crime officer must not always be accompanied by the BFID and a secondary forensics personnel in case the Head of IT is busy.
  • The fifth and sixth  meetings you will find  employees whom you were designated to get the email headers from are not present.When you ask the Head of IT he will declare he is not in charge of them.
  • Seventh meeting they will ask for a court order for them to release the data.       

The triple DJ tactic will make sure you will  spend at least six to nine months before they ask for the court order.

  • First month Equity Bank  will assure you they will conduct an internal investigation and they will pay you when they write their report.At the end of the month they will  blame you for negligence and citing an agreement you signed as the reason for no compensation.
  • Second month if you follow up with the BFID,will be wasted by the officer assigned your case who will be busy until you report the officer to the boss.
  • Third month will be wasted trying your case to be assigned to a cyber crime officer who you will be assured he is authorized to give evidence in a court.
  • Fourth month will be wasted between the bank,BFID and Cyber Crime officers trying to come up with meetings to solve the case.
  • Fifth month will be wasted by excuses by the bank’s officers  so as to postpone the  meetings.You will try your best to combat these excuses by talking with the Head of Security to allow the Cyber Crime officer be allowed to investigate out of presence of BFID IO.Next meeting you will go again to Head of Security to request for another bank’s security officer as the assigned officer for  your case had an emergency.
  • Sixth month they will ask for a court order as by this time your intelligence ,gut feelings  and attitude towards them  for their remorsefulness will be turned to anger and total despair.They will advise you to go home and let the officers do their job .But  if you do not follow up with the investigating officers they will forget the case. 
  • Seventh month will be wasted by the officers trying to get the court order citing judges as overwhelmed with court cases.
  • Eighth month the bank will be served with a court order when coincidentally the officers involved in executing the fraud will be transferred to other branches in and outside Kenya.
  • Ninth month will be wasted awaiting the officers to be relocated back to Kenya.

This is an emphatic fraud case  of the hell I have gone through courtesy of officers from Equity Bank,BFID and Cyber Crime officers who masquerade as angels while riding you through hell.This 3DJ strategy I have learned at first hand and am a witness ,the bank officers involved have  mastered it to perfection. This is a case of over 16000 dollars embezzled through internal fraud revolving around emails.What about mobile money fraud cases which will revolve around 10,000 kshs to 50,000 kshs?These thin sim technology fraud victims will not endure the 3DJ strategy , by the second month 90 percent will give up on their cases.This is the main goal of 3DJ strategy of dealing with fraud cases.  

Its of high importance banks in Kenya honor email indemnities signed by their customers by ensuring fake emails are blocked from bank’s email system and bank employees are trained on authenticating emails.This case requests email indemnities be nullified through court order until fake emails are successfully blocked and employees are trained on email authentication.  

My case mainly revolves around fake emails, fake replies ,forged documents ,fake bank statements ,collusion and negligence by Equity Bank employees in charge of these emails. The fraudsters’ emails to the bank were executed swiftly while my complaints and requests to the bank were ignored thereby facilitating the fraudsters total control of my funds.  Even after sending several emails complaining of over 8000 dollars missing from my account , other counter measure emails were sent to misled the detection.Then fake bank statements were sent to my email address while crucial emails and bank statements went undelivered .At the same time I was been bombarded with fake emails ,fake bank statements and misleading advisories such as to ignore internet banking due to technical problems. 

Note this investigation is based upon emails as the means of communication between myself as the customer/complainant and Equity Bank.The instructions were delivered through emails whereby as a complainant I did not send the emails and I did not receive the emails concerning these two fraudulent funds transfers as well as other emails meaning the fraudsters anticipated all major emails from the bank to me.Also we have proof some of the Cyber crime data provided by the Head of IT are tampered and not all data have been provided even after the bank was served with a court order for the email headers.Its imperative there be physical confirmation of the emails and retrieval of email headers be exercised to nullify any chances the data is compromised or altered . Investigation points to several employees who are fraudsters but well protected by the bank  and its imperative that we have physical confirmation of the alleged emails ,for surely the bank does not deny physical confirmation of other emails but the ones involved they deny,delay and alter. 

Equity Bank employees went as far as  to make imaginary emails that they allegedly replied to as part of their cover up so as to ignore my complaints.The bank has also denied physical confirmation of the emails and email headers as they are retrieved.The bank wants to give prepared email headers which are easy to forge, for example you take an old email header,delete the email addresses and time stamps and insert your preferred email addresses and timestamps .Then you give to the Head of IT Charles Wanyoike who is very protective of the Equity Bank fraudsters whereby he has insisted he must be there every time the Cyber Crime officer and myself go for the email headers whereby every time there is an excuse to postpone the physical confirmation of the email headers .The Head of IT confessed not to have received some email headers meaning instead of retrieving them himself he was given prepared email headers.

Email Indemnity is nullified when fake emails are involved as instructions referring to the emails used in these two fraudulent funds transfers. In a matter of ten minutes in the month of June 2014,the Head of IT Charles Wanyoike trained me as fraud victim how to authenticate email headers as well as using email header analyzers to ascertain the source and location where the emails are emanating from.Prevention is better than cure ,the Head of IT is willing to train a fraud victim on email authenticity but unwilling to train fellow colleagues in charge of billions of customers’ money.This is not the first case of fake emails being used to defraud customers and yet fraud through fake emails continues to exist.If in ten minutes I can be trained to authenticate emails as a customer ,how much more should bank employees be well trained ? The emails involved in this fraud are full of discrepancies and distortions and only a colluding Senior Officer such as Susan Mati could have executed them. 

Equity Bank employees in charge of this fraudulent transfers confessed that the only authentication of emails is only checking the email addresses.This means the Head of IT is incompetent and complacent in securing the banking system from fake emails and training employees in email authentication. Also the employees share passwords as employees like Abigael Mwangi ,Sheila Ingasiani and Carol Wambui have access to fellow employees emails as proved in this demand letter.This is a breach of bank security whereby passwords should not be shared.

I demand the court order served to the bank to be honored in a manner the complainant and external investigators will be satisfied with the email headers retrieved and the metadata information contained in the attachments must also be collected.This is only through physical confirmation of all the emails listed in the court order and while the email headers are retrieved, I must be a witness as the complainant.I  must witness the retrieval of the email headers as I am the best person who understands this fraud case and also make sure that metadata in the email attachments is collected and all the relevant email headers are retrieved.

Its of high importance that the metadata is collected begging the question what kind of report the bank is expecting from the investigators, when  even the metadata has not been provided which has vital information regarding the author, source and software used to create the ten attachments used in this fraud .The bank’s insistence claiming they are waiting for the Police report is a sham ,as they have not provided all the relevant data.The bank cannot claim to be waiting on a report while the data given is incomplete as well as tampered.

My demand is for Equity Bank  to refund my account with 8450 dollars at interest rate of 12 percent starting on the 28th February 2014 and 7800 dollars at 12 percent interest rate starting on the 22nd April 2014.This fraud is purely an internal fraud with employees running an international syndicate as proved in this letter. If this demand letter is not honored I have no otherwise but to pursue legal justice to enforce recovery of my funds plus the interest and making sure I get rid of this syndicate working for Equity Bank . 

SUMMARY OF THIS DEMAND LETTER 

NOTE: 

I was in Kenya for 20 days for my holiday from 7th December to 27th December 2013 and I did not activate my dormant account to access the funds but instead I relied on company’s visa card and the kshs account for withdrawing. 20 days in Kenya and then after 12 days while in Afghanistan am trying to activate my dormant account for such a huge money transfer?

Dormant accounts advisory is well publicized in the Banking Fraud Investigation Department noticeboard that bank employees targets such accounts for embezzlement and hereby I refer to the exact notice as publicized in the BFID:  

STANDARD NEWSPAPER ON DORMANT ACCOUNTS ON 13TH OCTOBER 2010

Why you should monitor bank account regularly

Updated Wednesday, October 13th 2010 at 00:00 GMT +3 

Is your bank account dormant or used to make huge and regular payments? Beware fraudsters and bank staff are on the prowl for such accounts, writes Michael Oriedo.

If you have noticed a withdrawal on your bank account, which you did not make and your bank cannot explain, chances are you are a victim of fraud.

CCI has ascertained that some dishonest bank employees are defrauding account holders their hard-earned cash using tactics they have devised to beat banks’ systems. Unfortunately, bank workers have realised it is quite easy to get away with the crime due to weak laws and lenient sentences on ‘white collar’ crime in Kenya.

Please refer to the entire story in the Standard Newspaper by searching the title :Why you should monitor bank account regularly

Also if my email address was hacked ,all the information used in these two funds transfers were not to be found in my email address especially the last three transactions which were done through e-banking. The last three transactions only the bank knew them.Then where did the hackers got that information?It either means the hackers also hacked Equity Bank or the fraudsters are Equity Bank employees.

Please consider all the emails am referring to in this letter as non-initiated by  unless stated to be sent by me and received by me. I mean I did not send them and the ones emanating from the bank  I did not receive.The fraudsters seemed to block all relevant emails and allowed only the irrelevant and misleading emails.Remember I shared the same password for my email address with the internet banking password. 

FIRST EVIDENCE 

The first email  was allegedly sent by me on the 8th January 2014  to James Maina and Christine Bonface. These two employees are the ones I used in 2012 for funds transfers which were directed to my family members.These two employees were the last personnel I used in funds transfer through email instructions until I received Internet Banking in the year 2012.

First ,by coincidence both of them were not present in the Diaspora Department.James Maina I came to learn was transferred to another branch while Christine Bonface returned an automatic out of office reply according to the email traffic data provided by Charles Wanyoike. Only the employees of Diaspora and E-banking Department could have known that James Maina and Christine Bonface were unavailable thereby facilitating a window for a new employee to undertake the funds transfer.

Second, this fraud required an employee who would feign that I did not have internet banking as a cover up for the fake emails I would receive about internet upgrading.This proves the fraudsters are equity bank employees as this fraud needed an employee who would ignore knowledge of my internet banking and who better than an employee who never had any previous contact with me,and eventually the job was handed to  Senior Officer Susan Mati, Diaspora Banking .This senior officer namely Susan Mati  have the skills to analyze an account is dormant and yet has no skills to establish its registered for internet banking.She feigned my lack of internet banking up to the point of advising me to apply for internet banking in her alleged emails to me on the 28th February 2014 and 22nd April 2014.

Yet on the 18th March 2014 she reversed 500 dollars on my internet banking account but declines to inform me through email herself but prefers her colleague a junior officer Christine Njihia  to inform of the reversal one day prior to the actual reversal .I was informed of the reversal on the 17th March 2014 by Christine Njihia ,one day prior to actual reversal by Susan Mati on the 18th March 2014 so that Susan remains anonymous to me.She knew her alleged emails to me were never delivered.Peruse through this letter as more evidence awaits in plenty.

Third, it was paramount the funds transfer been done through emails and I be involved unknowingly in the name of internet upgrading so that I could activate my dormant account .This was the plan of the fraudsters that by 10th January 2014 I activate my dormant account in the name of internet upgrading, but when I did not activate my dormant account they changed tactics to requesting next of kin details in the name of internet upgrading.  

SECOND EVIIDENCE

The forwarded email from James Maina to on the 8th January 2014 was sent at 13:30 PM, this email was ignored for 18 hours and early the next morning on 9th January 2014 exactly at 8:20 AM, Abigael Mwangi assigns the job to Susan Mati through email and at the same time the same email is forwarded to James Maina. 

First it took 18 hours to decide who will execute this fraud  for as early as 8:20 AM ,Abigael’s first task is to assign the job to Susan Mati. Why the delay of waiting 18 hours ? there are very many employees in the Diaspora Department working 24 hours.Assigning the job to Susan Mati was a well orchestrated tactic by Abigael Mwangi who just feigns that she just assigned the job on  a whim.Diaspora Department operates 24 hours ,why would it take them 18 hours to assign the job to an employee?Unless the designated employee was not available on the Wednesday of 8th January 2014 and the ultimate delay of 18 hours.  

From: Abigael W.Mwangi 

Sent: Thursday ,January 09 ,2014 8:20 AM

To: Susan K.Mati

Cc: Kenyans.Abroad;James Maina

Subject: FW:FUNDS TRANSFER

Sue,

Please assist 

From: James Maina 

Sent: Wednesday ,January 08 ,2014 1:53 PM

To: Kenyans.Abroad

Subject: Fwd:FUNDS TRANSFER

Hello team

Happy New Year .kindly assist Alex on his request.Thanks

regards

Maina

——–Original message——–

Subject:FUNDS TRANSFER

From:Alex Kihika <>

To:James Maina <>,”Christine N.Bonface”

<>

Cc:

Please transfer money from my dollar account  to my used car supplier in japan as directed in the attachments herewithin.

In the above email message history you will notice the initials for a forwarded email are FW but from james maina’s forwarded email to the team its Fwd.Also the Subject matter (Subject:FUNDS TRANSFER) should fall below (From:Alex Kihika <>

To:James Maina <>,”Christine N.Bonface”

<>

Cc:) 

Please take note of the above email from Abigael to Susan and notice how the attachments are named as ap,ic 11.PNG and aplic 22.PNG.Below is the email header of the above email that has been tampered .Notice there is no indication of the attachments. 

Received: from EQCMSGSVR.ebsafrica.com

 ([0000:0000:0000:0000:0000:0000:0.0.0.1]) by eblmsgsvr01.ebsafrica.com

 ([10.1.1.61]) with mapi; Thu, 9 Jan 2014 08:20:24 +0300

Content-Type: application/ms-tnef; name=”winmail.dat”

Content-Transfer-Encoding: binary

From: “Abigael W. Mwangi” <>

To: “Susan K. Mati” <>

CC: Kenyans.Abroad <>, James Maina

<>

Date: Thu, 9 Jan 2014 08:20:23 +0300

Subject: FW: FUNDS TRANSFER

Thread-Topic: FUNDS TRANSFER

Thread-Index: Ac8MXustQd8LbUBIQ+iGBilJkGsTogAANR+gACapZGA=

Message-ID: <>

References: <>

In-Reply-To: <>

Accept-Language: en-US

Content-Language: en-US

X-MS-Has-Attach: yes

X-MS-Exchange-Organization-SCL: -1

X-MS-TNEF-Correlator: <>

MIME-Version: 1.0 

Second, why would the Head of IT risk giving tampered data while I as a complainant I have insisted time and time again for the physical confirmation of the email headers of which he has adversely refused physical confirmation of the emails and email headers?Its very easy to tamper with copied and pasted email headers explaining the reason why the Head of IT has insisted in handing over the email headers instead of physical confirmation of the emails and email headers as recommended.

Third ,notice that James Maina is included in this email as well as the next email from Susan Mati allegedly to me. 

THIRD EVIDENCE 

After six hours since she was assigned the job by Abigael Mwangi, exactly at 2:09 PM ,Susan Mati allegedly sends her first email to my email address and copies James Maina through that this email was in form of a reply.This email reads as :

From: Susan K.Mati 

Sent: Thursday ,January 09 , 2014 2:09 PM

To:

Cc: James Maina

Subject: RE: FUNDS TRANSFER

Attachments: DIASPORA ACCOUNT REACTIVATION FORM..pdf 

Hello Alex 

Thank you for your email. Trust that you are keeping well. We are in receipt of your funds transfer instructions However your account has been flagged dormant since you have not used it for awhile. Kindly activate the account so we can complete the transfer. Find attached the account reactivation form, fill in scan and email back for processing. Remember to attach a copy of your ID. We look forward to hear from you.  

Warm regards,

Susan K. Mati.

Diaspora Banking

Practically Susan Mati should have sent a direct email to my email address ,but she goes to great lengths to send this email as reply for the purpose of making sure the entire message history is retained.Hypothetically it means when she hit the reply button automatically  the sender of the previous email becomes the recipient . Meaning she deleted Abigael as the recipient , typed my email address as this was her first email allegedly to me,then includes James Maina and eventually attached the attachment. 

This email should then be analyzed by Cyber Crime experts as a reply from Abigael but directed to me.The email header should have a reference of Abigael Mwangi’s email to Susan Mati. If not so ,then the message history was implanted as well as the word ‘RE’ rendering this a fraudulent ,misleading and a fake email.

This proves she went to great lengths to include the message history as both Abigael and Susan Mati anticipated the fake email I would receive on the 10th January 2014 purportedly from James Maina. This is the main reason Abigael and Susan Mati includes James Maina in this email traffic. The message history would point to James Maina as the first recipient of the email and subsequent copies regarding this funds transfer, so that they could frame hackers/fraudsters as having the access to the message history. This maneuver by Abigael and Susan created leverage for  the fraudsters to use fake email in the name of James Maina on the 10th January 2014 thereby exonerating themselves as the perpetrators behind this fraud. 

James Maina was the employee in the year 2012 who executed funds transfer on my behalf through instructions via emails.His involvement in here especially his email address been used to send a fake email about internet upgrading  was a well calculated tactic by Senior Officers Abigael Mwangi and Susan Mati,for only Diaspora Department  employees  knew the relations between me and James Maina in the year 2012. They predicted I would easily believe an email from James Maina about internet upgrading based on our history in the year 2012.Luckily I did not act on that fake email.  

First note that this was her first email to my email address and it was in form of reply so that means she typed my email address so for the email to appear as means the email was never meant to be sent. Also she goes to great strength to make sure the message history and traffic is well preserved to justify the fake email I would receive on the 10th January 2014 about internet upgrading .Explaining the reason why the bank withholds her email headers and others to cyber crime officer Hannington Chuba .

Second who saves an email address as ‘’ , it only means these emails went not meant to be delivered. 

Third ,when this email is printed by Abigael Mwangi, the email address appears as while the one printed by Susan Mati appears as .Yet its the same email but when printed by different employees the email address changes. How is it possible for a sent email to camouflage like a chameleon when printed by another employee.The email address of a sent email should never change.

Fourth ,how come Abigael Mwangi has access to Susan Mati’s computer and password so as to enable her print emails meant for Susan Mati. This is also supported by other emails printed by other employees as later explained.It shows how Equity Bank emails and computers are easily accessible between  the colleagues.

Fifth , how come the email header of Abigael Mwangi email to Susan Mati lacks the parameters for attachments.The Head of IT totally denied physical confirmation of these emails and email headers while this email header given to Cyber Crime is tampered and lacking vital information.As well as Susan Mati’s email headers to my email address were never released.It very easy to forge an email header without physical confirmation,you just implant email addresses and timestamps.

Can Charles Wanyoike explain how the above email header lacks parameters for the two attachments attached to the email?This is the reason why we insist on physical confirmation of the emails and email headers.The above email header has been tampered with? 

Below is an email header from me to James Maina on the 22nd september 2014.I requested for the email header from James Maina’s emails he supposedly received from Susan Mati as indicated in the above email on the 9th January 2014.This is why am requesting for physical confirmation of the emails as this proves to be an internal job that Equity Bank is protecting from prosecution.How dare Charles Wanyoike include such irrelevant email header  in Cyber Criminal  data that is supposed to be included in a report.  

This is proof that this investigation is fully under the triple D strategy of distract ,delay and deny justice.This is the irrelevant email header which was given Cyber Crime Officer for analysis and eventual report.The requested email header was for 9th January 2014 email from susan mati to me and james maina.

Received: from EQC-EB-MAILGW02.ebsafrica.com (10.1.6.33) by

eblmsgsvr01.ebsafrica.com (10.1.1.61) with Microsoft SMTP Server (TLS) id

8.3.348.2; Mon, 22 Sep 2014 19:00:44 +0300

Received: from mail.equitybank.co.ke (10.11.4.6) by

EQC-EB-MAILGW02.ebsafrica.com (10.1.6.33) with Microsoft SMTP Server (TLS) id

8.3.348.2; Mon, 22 Sep 2014 19:00:44 +0300

X-IronPort-Anti-Spam-Filtered: true

X-IronPort-Anti-Spam-Result: ArcCAGhIIFRii9WYlGdsb2JhbABgg2FXBAi1AoQCkUOHTYEPFgEBEAEBAQEHCwsJEiyDelABGAcaFQgBgQcYCogyAQMPAgcGnxmRKoMQiQkBIycDhwYBEQIEDAIBjxURAUyEVgWFDQWGM4pKhw6HRTeELYdIhVtMAQGBDYE7AQEB

X-IronPort-AV: E=Sophos;i=”5.04,572,1406581200″; 

   d=”scan’208″;a=”29042679″

Received: from nm11-vm1.bullet.mail.bf1.yahoo.com ([98.139.213.152])  by

mail.equitybank.co.ke with ESMTP/TLS/DHE-RSA-AES256-SHA; 22 Sep 2014 19:00:41

+0300

Received: from [98.139.214.32] by nm11.bullet.mail.bf1.yahoo.com with NNFMP;

22 Sep 2014 16:05:25 -0000

Received: from [98.139.212.245] by tm15.bullet.mail.bf1.yahoo.com with NNFMP;

22 Sep 2014 16:05:25 -0000

Received: from [127.0.0.1] by omp1054.mail.bf1.yahoo.com with NNFMP; 22 Sep

2014 16:05:25 -0000

X-Yahoo-Newman-Property: ymail-3

X-Yahoo-Newman-Id:

Received: (qmail 30169 invoked by uid 60001); 22 Sep 2014 16:05:25 -0000

DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1411401925; bh=AMwPREem9To5WAzsPhhl70ohEVjBsGnVBzM/TtO9iVg=; h=Message-ID:Date:From:Subject:To:MIME-Version:Content-Type; b=u+/M61Awd92Cg/rfKXcvO0mKqK2bCFjIcCH6MFL6UhgYBnJ/eBK6OvH6jH9r9GJdOv3njD1OC7i9dS4pRS+W3Rv0yWVsiwnuQBk2SGnoxLr1s0gY1JSBotKq5Lv917xBjTC4QGWHGFP7zhv1hqh5cEI/THjaonjmkZIWwqnZtfg=

X-YMail-OSG: dnEEbl4VM1mnUL_Ac7whfw464Mxpbaw0SvPwcdEmnF39HZP

JMk6RIOQLevblDKwXo5AkpI6V8BUL2.j5QzQ5Q7TQlOmLAQqcK1KuRImgGxU

LWPM5gcPgsKpc4u1_bQ_uTOl09rjQ.I73lb.K_HFECO0xEi6j7MkBkEuMK3F

qLoSLtuXJSPMwdOsLFf3hs1cAFpl_zVW6MjcfFAg2mVl0GtO3aG9.GAI9Wg5

H1uEGfNu8jULm73C.nf5pg2Ga8U9jzlHaX6sO.f_eEZNu6BxDLuVz9ib61bV

_BCyc4HuRxx11.yhiRpsHhLQFa3M2NMaPwWmojx4nTQp1b4p9pwKLPYXbkkG

uKnQEvXKv6NPpkO3fgdhBnSUJbUeAqo3pRRgo_B4yVygu0k6gmjH_wbGiwed

uRfVy0WrS2khRjb.CcX5po56qySUNYtlHdzr6_Mq4.SflbRQ6o5rucGG9XED

Axn_Mo0OYVTX9FA5.EVTuhlopTUyEu3GrmQjb7D3ibVOGoVxh.vMoh4rpE_p

OhpwDFv3DvjjN.n1P6dd61xbzajnM9deq4j5hlqWaUJtvMd8RUp1u.hfrNfn

ODSFFNtVfkMDYxkx6C2K5G4Nz0zklPOna6piu1fY8zA6E5CG0ydRx593WTQT

8NX39Uw8GKS3Uj6bxFZQm7v0aFkTddFkUt7Pcafe9tpWU0oGt2EM-

Received: from [196.201.216.139] by web141703.mail.bf1.yahoo.com via HTTP;

Mon, 22 Sep 2014 09:05:25 PDT

X-Rocket-MIMEInfo: 002.001,SGkgSmFtZXMgYW0gcmVxdWVzdGluZyB5b3VyIGNvb3BlcmF0aW9uIGZyb20gdGhlIHR3byBmcmF1ZCB0cmFuc2ZlcnMgdW5kZXIgaW52ZXN0aWdhdGlvbi4gV2UgZ290IGFsbCB0aGUgZW1haWxzIGludm9sdmVkIGluIHRoZSB0d28gdHJhbnNmZXJzIGZyb20gU3VzYW4gbWF0aSBhbmQgb24gdGhlIDl0aCAyMDE0IHNoZSBjYyB5b3UgYW4gZW1haWwgdGhhdCBhbGxlZ2VkbHkgd2FzIGFsc28gc2VudCB0byBtZSBvZiB3aGljaCBJIGRpZG4ndCByZWNlaXZlIGluc3RlYWQgSSBnZXQgdGhlIDEwdGggamFudWFyeSABMAEBAQE-

X-Mailer: YahooMailAndroidMobile/4.0.4 YahooMailWebService/0.8.203.696

Message-ID: <>

Date: Mon, 22 Sep 2014 09:05:25 -0700

From: Alex Kihika <>

Subject: 9th 2014 email from Susan mati

To: James Maina <>

MIME-Version: 1.0

Content-Type: multipart/alternative;

            boundary=”1628430994-746541574-1411401925=:91441″

Return-Path:

X-MS-Exchange-Organization-PRD: yahoo.com

X-MS-Exchange-Organization-SenderIdResult: Pass

Received-SPF: Pass (EQC-EB-MAILGW02.ebsafrica.com: domain of

designates 98.139.213.152 as permitted sender)

receiver=EQC-EB-MAILGW02.ebsafrica.com; client-ip=98.139.213.152;

helo=mail.equitybank.co.ke; 

The above email header is irrelevant in the report highly expected by the bank and missing email headers from Susan Mati’s emails to my email address meaning the expected report from Cyber Crime which will be acted upon by Equity Bank and BFID is hampered by tampered email headers ,irrelevant email headers and undelivered email headers.

Now the email below targeted my compliance of activating my account in the name of internet upgrading for diaspora clients  This email I received on the 10th January 2014 , yet allegedly I sent an email to James Maina and Christine Bonface for assistance in the funds transfer of over 8000 dollars.While during December 2013, I was in vacation for 20 days in Kenya and then left on the 27th December 2013 headed to Afghanistan. Why did I not execute such a large amount of transfer in the history of my life while in Kenya, but instead decides to do it one week after coming from vacation.Never have I ever sent money to any organization but only to individuals.Ask yourself if I authorized the funds transfer by the 9th of January 2014, I would have activated my account and funds transfer gone through, latest at the 10th January 2014.But thats not the case because I did not authorize the funds transfer,the fraudsters (Equity Bank employees)shows they were two steps ahead all the time.How did the fraudsters intercept communication between me and the bank.

Its quite ironic the fraudsters knew I had internet banking while a senior officer namely Susan Mati feigns I did not have Internet Banking.

Listed below is the  fake email I received on 10th January 2014 followed by its email header and it had attachment for account activation form authored by Simon Miano who is an equity bank employee.

Note the email address attached to this email which  the bank deny its an official email address.Peruse through this letter as the evidence awaits in several emails and email  headers which proves all along Susan Mati had foreknowledge of the fake emails.She  knew every move about this fraud and explains the misdirecting fake emails which kept me in the dark all along .It took almost two months for the fraudsters to activate my account with several fake emails proving that only an equity bank employee could have anticipated the next moves and documents identical to equity bank documents logos and contacts.  

The 10th January 2014 fake email supposedly from James Maina advising me activate my dormant account for internet upgrading reads : 

James Maina

To

Me

 Jan 10 

Hello Alex 

Happy New Year. Trust that you are keeping well. We are in process of upgrading internet banking for our Diaspora clients. However your account has been flagged dormant since you have not used it for awhile. Kindly activate the account so we can complete the account upgrading process. Find attached the account reactivation form, so urgently fill in scan and email back for processingRemember to attach a copy of your ID. We look forward to hear from you 

Warm regards,

James Maina.

Diaspora Banking 

Equity Bank Limited |Equity Center, 5th Floor | P.O. Box 75104-00200, Nairobi| Kenya  

http://www.ke.equitybankgroup.com/equitydias/ 

The email header from the above fake email allegedly from James Maina

 

From James Maina Fri Jan 10 01:02:44 2014

X-Apparently-To: via 66.218.75.156; Fri, 10 Jan 2014 01:04:43 -0800

Return-Path: <>

Received-SPF: none (domain of equitybank.co.ke does not designate permitted sender hosts)

 X-Originating-IP: [46.167.245.116]

Authentication-Results: mta1361.mail.gq1.yahoo.com  from=equitybank.co.ke; domainkeys=neutral (no sig);  from=equitybank.co.ke; dkim=neutral (no sig)

Received: from 127.0.0.1  (EHLO emkei.cz) (46.167.245.116)

  by mta1361.mail.gq1.yahoo.com with SMTP; Fri, 10 Jan 2014 01:02:48 -0800

Received: by emkei.cz (Postfix, from userid 33)

id 3445AD5983; Fri, 10 Jan 2014 10:02:44 +0100 (CET)

To:

Subject: EQUITY BANK INTERNET BANK UPGRADE

From: “James Maina” <>

X-Priority: 3 (Normal)

Importance: Normal

Errors-To:

Reply-To:

MIME-version: 1.0

Content-Type: multipart/mixed; boundary=BOUND_52CFB7349A8757.44583594

Message-Id: <>

Date: Fri, 10 Jan 2014 10:02:44 +0100 (CET)

Content-Length: 41740 

Hypothetically it means on the 9th and 10th January 2014 I received two emails advising me to activate my dormant account for two different reasons.The 10th January 2014 email was targeting me to activate my dormant account for internet upgrading but instead of internet upgrading the funds transfer were going to be executed.This fake email relied on my compliance in activating my dormant account for a dubious reason and after complaining,Equity Bank would ask if I activated my account ,which would mean I also initiated the funds transfer.This was solely for exonerating Abigael Mwangi and Susan Mati as the fraudsters.James Maina’s email address in this fake email was supposed to rekindle the first and last transactions I executed through James Maina in the year 2012 thereby trusting and executing the instructions advised in this fake email.Only Diaspora Department employees knew about my bank relation with james maina in the year 2012. 

This proves that the fraudsters knew I did not receive the alleged email from Susan Mati thereby embarking on sending me the fake email on 10th January 2014.  

I received several emails of which I came later to realize were fake emails that went as far as requesting me to activate my dormant account for internet upgrading ,requested for next of kin details in the name of internet upgrading ,sent me fake bank statements and lied to me the internet banking was experiencing technical problems so as to ignore online statements and rely on the sent bank statements.Peruse through this letter as more evidence emerges displaying this as an internal fraud. 

FOURTH EVIDENCE

First notice the above email targeted my compliance of activating my dormant account in the name of internet upgrading while actually it was meant for funds transfer.

Second this fake email resembles Susan Mati’s email allegedly to me on the 9th January 2014 which read as follows: 

Hello Alex, Thank you for your email. Trust that you are keeping well. We are in receipt of your funds transfer instructions. However your account has been flagged dormant since you have not used it for awhile. Kindly activate the account so we can complete the transfer. Find attached the account reactivation form, fill in scan and email back for processing. Remember to attach a copy of your ID. We look forward to hear from you.  

Warm regards,

Susan K. Mati.

Diaspora Banking

 

The above email from Susan Mati and the fake email from James Maina are exactly the same ,the only difference is reason for activating my dormant account.The email listed below is an evolved email of the 10th January 2014 fake email supposedly from James Maina ,now only requesting for next of kin details in the name of internet upgrading.

 

Note the 31st December 2013 email from is a real email but I want you to compare the pictures and logos used here.Also note this email address sends emails in double sequences.Here is the email ,compare it with the fake email below this real email. 

Kenyans. Abroad

To

me

Dec 31, 2013 

OUR ESTEEMED CUSTOMERS,

PLEASE NOTE THAT OUR DIASPORA BRANCH WILL REMAIN CLOSED ON WEDNESDAY 1st January 2014.

REMEMBER YOU STILL HAVE ACCESS TO YOUR ACCOUNT 24 HOURS THROUGH

·         INTERNET BANKING

Ø  Do transfers online to third parties in Equity Bank and to other banks.

Ø  View your statement online.

Ø  View and/or print detailed account information online.

Ø  Request for a Bankers cheque to be collected by a nominated person from a desired Equity bank Branch country wide.

Ø  Cheque book request.

Ø  Transfer of funds to Equity Bank customers in real time.

Ø  Transfer of funds to the recipients in other local banks through EFT.

·         EAZZY 247

Ø  View your statement and balances on your mobile.

Ø  Transfer of funds to Equity Bank customers in real time.

Ø  Transfer of funds to the recipients in other local banks through EFT.

Ø  Transfer money to MPESA and/or orange money.

·         VISA CARDS

Ø  Shop online.

Ø  Shop at any visa branded POS (point of sale).

Ø  Withdraw money at any visa branded ATM.

·         EQUITY DIRECT: (For Equity customers living in the UK) Transfer money directly to your Equity bank account from any UK bank in all the major currencies. The transfer to Equity bank is done real time and hassle free.

·         PAYPAL:. PayPal is a payment service that enables you to accept payments, pay for goods and send or receive money without revealing your financial information anywhere in the world. PayPal is the safer, easier way to pay and get paid online. The Equity Bank Withdraw Service with PayPal allows you, a Kenyan PayPal account holder, to withdraw funds paid into your PayPal account to your Equity Bank account.

WISHING YOU A MERRY CHRISTMAS AND A PROSPEROUS NEW YEAR 2014!

NORMAL BUSINESS RESUMES ON THURSDAY THE 2nd of January 2014.

Tel: +254 202262481, +254 202262533/7, +254 202262482/3/4 +254711026481/2/3/4, +254711026533/7, +254732112533  http://www.ke.equitybankgroup.com/equitydias/ 

DISCLAIMER:

This email message and any file(s) transmitted with it is intended solely for the individual or entity to whom it is addressed and may contain confidential and/or legally privileged information which confidentiality and/or privilege is not lost or waived by reason of mistaken transmission. If you have received this message by error you are not authorized to view disseminate distribute or copy the message without the written consent of Equity Bank Group and are requested to contact the sender by telephone or e-mail and destroy the original. Although Equity Bank Group takes all reasonable precautions to ensure that this message and any file transmitted with it is virus free, Equity Bank Group accepts no liability for any damage that may be caused by any virus transmitted by this email. 

This fake email was sent twice on the 23rd January 2014 just like all emails from the email address while comes in doubles.Below is the email : 

Kenyans.Abroad

To

me

Jan 23, 2014

 OUR ESTEEMED CUSTOMERS,

 ESTEEMED CUSTOMERS,PLEASE  NOTE THAT OUR DIASPORA BRANCH WILL BE UPGRADING INTERNET BANKING FROM  THURSDAY 23 January 2014.REMEMBER, YOU STILL HAVE ACCESS TO YOUR ACCOUNT 24 HOURS THROUGH  PLEASE RECONFIRM  US WITH THE DETAILS OF YOUR NEXT OF KIN AND RELATIONSHIP,FOR YOUR ACCOUNT INTERNET UPGRADING

Tel: +254 202262481, +254 202262533/7, +254 202262482/3/4 +254711026481/2/3/4, +254711026533/7, +254732112533 " target="_blank" rel="noopener"> http://www.ke.equitybankgroup.com/equitydias/

 

 

DISCLAIMER:

This email message and any file(s) transmitted with it is intended solely for the individual or entity to whom it is addressed and may contain confidential and/or legally privileged information which confidentiality and/or privilege is not lost or waived by reason of mistaken transmission. If you have received this message by error you are not authorized to view disseminate distribute or copy the message without the written consent of Equity Bank Group and are requested to contact the sender by telephone or e-mail and destroy the original. Although Equity Bank Group takes all reasonable precautions to ensure that this message and any file transmitted with it is virus free, Equity Bank Group accepts no liability for any damage that may be caused by any virus transmitted by this email.

Reply, Reply All or Forward | More

 

 

Now the aim of the above fake email on the 23rd January 2014 was also about activating my dormant account but now the fraudsters were going to do it on my behalf.From the  fake email on 10th January  2014 ,they wanted me to activate my dormant account unknowingly but from this email,they were bent on  activating my account through forgery,now all they needed was the next of kin details as requested from this email.

The email address is in the habit of sending double emails and this fake email  also came  in doubles.How can fraudsters and hackers know so much about  Equity Bank?

 

FIFTH EVIDENCE

 

First, from 8th January 2014 to 18th February 2014,the fraudsters resisted from sending emails to Equity Bank but were busy sending fake emails to me on 10th January 2014, 23rd January 2014 and 14th February 2014 .They could have used any name for the next of kin but they wanted this fraud to look legitimate as much as possible meaning the fraudsters are equity bank employees fearing to lose jobs if this fraud went wrong.

 

Second Susan Mati made no attempts on follow up from 9th January 2014 to 26th February 2014.She just went dumb like the fraudsters and made no attempts to enquire about activation of my account or whether I had changed my mind on the funds transfer.The main reason is, she  is one of these fraudsters and she knew I was receiving fake emails  about internet upgrading and she was now waiting for the next of kin details.

 

Third , on the 14th February 2014 I replied to one of these fake emails from and gave the next of kin details and wrote I will send the next of kin for physical confirmation and business.Then I received a reply on the same day about not to bother my next of kin going to the Diaspora Department and they only required her details for internet upgrading.

 

me

To

   

 

Feb 14, 2014

My next of kin’s name is Esther Wanjiku Kariuki. 

She is my mother and I will send her to visit your 

offices for physical confirmation and business.

——————————————–

 

On Fri, 2/14/14, Kenyans.Abroad <> wrote:

 

Subject: Re: Equity Bank Diaspora Banking

To:

Date: Friday, February 14, 2014, 2:43 AM

 

Dear Mr. Alex,

 

Thank you very much for your next of kin details, and

please be advised that we don’t need her to come to

our office. We only need her names, relationship and

contacts.

Please don’t disturb her to come to our Diaspora

Branch.

 

 

DISCLAIMER:

This email message and any file(s) transmitted with it is

intended solely for the individual or entity to whom it is

addressed and may contain confidential and/or legally

privileged information which confidentiality and/or

privilege is not lost or waived by reason of mistaken

transmission. If you have received this message by error you

are not authorized to view disseminate distribute or copy

the message without the written consent of Equity Bank Group

and are requested to contact the sender by telephone or

e-mail and destroy the original. Although Equity Bank Group

takes all reasonable precautions to ensure that this message

and any file transmitted with it is virus free, Equity Bank

Group accepts no liability for any damage that may be caused

by any virus transmitted by this email.

Reply, Reply All or Forward | More 

The Head of IT ,Equity Bank denied the existence of the email address have ever existed but the email traffic proves there was to and fro communication.He also denied the email address existed only after one week for him to confess that it existed and it was using a proxy server.So this contentious email address ()  was also using a proxy server.

What kind of a man learns from a stranger that he has an extra room in his house?All those years he is been working in Equity Bank he came to realize through a  complainant that they have a proxy server designated for use by the email address  .This is the Head of IT in charge of Equity Bank ,how many fraud cases has he compromised?For surely he has the time and guts to teach a customer/complainant about fake emails and how to analyze emails through email header analyzers yet he can’t train his fellow colleagues? This is negligence by Charles Wanyoike for surely this is not the first case in Equity Bank revolving fake emails ,yet they cannot block fake emails from penetrating the bank system and train employees in authenticating emails. 

 

Now on the 14th February 2014 was on a Friday ,then on the 18th February 2014 which was on a Tuesday , a fake email was sent to Susan Mati with four attachments.One of the attachments was  my colored passport copy I sent to the bank on 28th February 2012 when I was applying for Internet Banking.This colored passport copy is the exact one I sent to kenyans.abroad email address with the same marks and lines  created by the scanner .The deputy of Diaspora Banking Caroline Mugo confirmed the passport copy sent on the 28th February 2012. 

The second attachment was an activation form filled on the 17th February 2014.Then the other two attachments were the same sent to the bank’s employees on the 8th January 2014 but now they had been renamed from ap,ic 11.PNG and aplic 22.PNG to transfer form.PNG and transfer form2.PNG.

 

Fourth the fraudsters waited for 40 days from their first email to Equity Bank on the 8th January 2014 to their second email on 18th February 2014.This is because the fraudsters’ tactics of 10th January and 23rd January 2014 about internet upgrading did not work,but from 14th February 2014 the fraudsters had the next of kin details but my indication of sending my next of kin for physical confirmation was a big problem for them as it would expose their fraud .

After 4 days from when I gave the next of kin details the fraudsters send their second email to Equity Bank on Tuesday 18th February 2014 through a fake emailer.Their second email to the bank was a fake email begging the question if the fraudsters had access to my email address ,why would they use a fake email meaning also the rest of the emails must be fake emails. 

 

Fifth the activation form sent by the fraudsters on the 18th February 2014 to Susan Mati was filled on the 17th February 2014 which was on a Monday.The fraudsters waited from the 14th February unto 17th February 2014 waiting for the next of kin to appear but when they realized she is not coming ,they sent their second email on the following day 18th February 2014 at 1:22 PM.If the activation form was filled on the 17th February 2014 ,why did the fraudsters wait to send the email on the 18th February 2014 ?

The fraudsters waited to confirm if the next of kin was going to visit Diaspora Department but when she did not appear on monday 17th february 2014 and on the morning of 18th February 2014,  they knew their fake email to me about not disturbing the next of kin to visit their office had worked.How did the fraudsters confirm that the next of kin did not visit the Diaspora Department on monday when they filled the activation form? The fraudsters had to confirm the next of kin did not visit  Equity Bank diaspora department as employees/ fraudsters were afraid of the next of kin appearing and exposing the fraud.This is the reason why even after filling the dormant activation form on the 17th February 2014,they had to wait till the next day in the afternoon and send the email through a fake emailer.

Sixth, if the next of kin confronted them about the next of kin confirmation ,then they would deny ever sending such email.Then they would allude about a funds transfer I had initiated.If the next of kin informed me then I would deny ever sending such email.Then they would claim it was a fake email and that a fraudster was trying to defraud me.That was the reason why a fake email was used so that the employees would exonerate themselves. 

Seventh ,this is the same coincidence with the first email sent to the bank whereby the fraudsters knew both James Maina and Christine Bonface were not present in the diaspora department thereby facilitating a new employee (susan mati) who could feign my lack of internet banking as the employee knew I was receiving fake emails about internet banking upgrade and so the employee feigns her knowledge of my internet banking to exonerate her from the fake emails I would receive about internet upgrading.How did the fraudsters confirm the next of kin did not visit their office?

   

 

SIXTH EVIDENCE

The 18th February 2014 email purportedly from me to the bank was a fake email and it clearly shows on the message history ,the fraudsters had access to the former emails involving James Maina ,Christine Bonface, Abigael Mwangi ,Susan Mati and kenyans.abroad.

First , this was a fake email that penetrated the banking system while  customers are mandated to sign email indemnities facilitating Equity Bank employees with a loophole for defrauding and trading  in customers’ funds. 

Second it was acted upon by a senior officer in charge of this funds transfer.While we asked the employees in charge of this funds transfer how they authenticate emails ,they replied that they only look at the email address ,if it appears as your email address,then they execute the email.That is how Equity Bank employees are ignorant of cyber crime and arrogant when it comes to fraud investigations.

      Third this was a direct email and not a reply,how come a senior officer in the Diaspora Department failed to notice the message history.The message history would have indicated it was not a reply and thereby a fake and fraudulent email .

Fourth the time indicated in the message history was erroneous when compared with the email Susan Mati sent on Thursday 9th January 2014 2:09 PM.The message history indicated in this email showed Thursday,January 9 , 2014 3:09 AM.The time difference would also have triggered  this was a fraudulent email. 

Fifth, why would the fraudsters risk changing the times indicated in the message history?For this was enough to show recipient of this email that this was a fraudulent email.Why would they risk exposing this email to investigation?The only reason will be the fraudsters were the employees in charge of these emails.They had no fear of the emails being investigated and  a cover up by Diaspora Department employees to exonerate themselves as the fraudsters, as they knew the victim had no access to the emails and only themselves had access to the emails.The message histories were copied from Susan Mati’s emails and pasted, then sent to Susan Mati. They were masking the source of the message histories which would mean only Susan Mati had the source of the message histories. 

Note I had a smartphone that had access to my email account,the same way I receive short messages the same way I receive emails.So that means as soon as the emails were sent and hit my inbox ,they were deleted or the emails were never sent to me.So if the emails were deleted as soon as they were sent ,it meant they were deleted upon hitting my inbox or they were never sent.So where did the fraudsters get message histories involved in all the emails sent to Susan Mati (Equity Bank senior Officer,Diaspora Department).For surely they could not risk the victim from getting wind of these emails,so the emails were never sent or if they were sent they were deleted as soon as they hit my inbox thereby nullifying any chance of them having saved the emails.So where did the fraudsters get the message histories used in the emails directed to Susan Mati?This explains the emails sent to Susan Mati allegedly by me were masked as replies but the email headers show they are direct emails meaning the message histories were inserted (copy and paste).

Sixth by confession by Equity Bank security officers ,this is not the first fraud revolving fake emails ,a similar fraud befell a catholic priest whereby instructions were executed through fake emails.Meaning the IT Department has knowingly left a loophole for fraudsters ,the easiest way to cumber this fake emails is to train the employees to use email header analyzers.A big bank like Equity Bank should be utilizing this technology as surely the Head of IT has the passion to train me a fraud victim how to authenticate emails through email headers, but lacks the will to train fellow colleagues in charge of emails.It took only ten minutes to learn about email headers and authenticating real emails and fake emails.This means this a loophole designed by the IT Department for fraudulent transfers and trading.Equity Bank employees in charge of emails and IT employees should be trained what email indemnity means and security features created to honor email indemnity between a bank and a customer.    

 

SEVENTH EVIDENCE

The fraudsters’ fake email  to susan mati on the 18th February 2014 at 1:22 PM  reads as follows:

 

From: Alex Kihika<>

Sent: Tuesday ,February 18 ,2014 1:22 PM

To: Susan K.Mati

Cc:

Subject: FUNDS TRANSFER

Attachments: alex pp.pdf;DIASPORA ACCOUNT REACTIVATION FORM..JPG;transfer form.PNG;transfer form2.PNG

 

Dear Susan,

 

Hope you are doing well and good.

 

I sent you a transfer request to my Japanese car supplier some few weeks back and you were not able to proceed with my transfer request ,because my account was dormant for some time and you sent me an account reactivation form and I was not able to respond in time due for some reasons ,our office printer hard a technical problem ,until now it was repaired.

 

You know at the moment I leave and work in some remote areas in Afghanistan.

 

So apologies for any inconvenient.

 

Please attached is the filled form ,my passport copy and I have again reattached the transfer form which I sent you last month.

 

Please proceed with the transfer and scan and attach the T/T copy for my reference.

 

Thanks

 

On Thursday ,January 9,2014 3:09 AM ,Susan K.Mati <> wrote:

 

Hello Alex

 

Thank you for your email

 

Trust that you are keeping well

 

We are in receipt of your funds transfer instructions

 

However your account has been flagged dormant since you have not used it for awhile

 

Kindly activate the account so we can complete the transfer

 

Find attached the account reactivation form, fill in scan and email back for processing. 

Remember to attach a copy of your ID

We look forward to hear from you

 

Warm regards,

Susan K. Mati.

Diaspora Banking

 

From:Abigael W.Mwangi 

Sent:Thursday ,January 09 ,2014 8:20 AM

To:Susan K.Mati

Cc:Kenyans.Abroad;James Maina

Subject: FW:FUNDS TRANSFER

Attachments:ap,ic 11.PNG;aplic 22.PNG

Follow Up Flag:Follow up

Flag Status:Flagged

Categories:assigned to me 

Sue,

Please assist

 

From: James Maina 

Sent: Wednesday ,January 08 ,2014 1:53 PM

To: Kenyans.Abroad

Subject: Fwd:FUNDS TRANSFER

Hello team

Happy New Year .kindly assist Alex on his request.Thanks

regards

Maina

 

——–Original message——–

Subject:FUNDS TRANSFER

From:Alex Kihika <>

To:James Maina <>,”Christine N.Bonface”

<>

Cc:

Please transfer money from my dollar account  to my used car supplier in japan as directed in the attachments herewithin.

 

   

 

My first email to this email address () was on the 14th February 2014 when I gave my next of kin details and wrote she will visit their offices for physical confirmation and business.I was replied the same day through a fake email advising me not to disturb the next of kin and coincidentally after 40 days of inactivity by the fraudsters towards the bank regarding my funds,four days later they send their second email on the 18th February 2014 with the next of kin details.Then after 2 days the fraudsters sent another email on the 20th February 2014 to Susan Mati enquiring if the money have been transferred  to their used car supplier in Japan.

First the fraudsters are now eager for the money to be transferred as indicated by their follow up of the 18th february 2014 and 20th February 2014 email.Remember their first email was on the 8th January 2014 ,their second email was on the 18th February 2014 as by now they had next of kin details and the only problem was the next of kin visiting their diaspora department for physical confirmation.

Second Susan Mati does not reply immediately until the 26th February 2014 as she had to confirm definitely that the next of kin did not visit their office and the fake email sent to me about not disturbing the next of kin had worked.She was the one in charge and so she waited for days to make sure the next of kin does not appear  and after 12 days she replies to the fake email of 18th February 2014.

 

 

 

 

EIGHTH EVIDENCE

On the 26th February 2014 at 5:03 AM early in the morning Susan Mati sends an email allegedly to me .Coincidentally  Susan Mati after 9 days she responds to the fake email sent to her on the 18th February 2014 which read:

 

From: Susan K.Mati 

Sent: Thursday ,February 26 ,2014 5:03 AM

To:

Subject: RE:FUNDS TRANSFER

Attachments: IDPP introduction.pdf

 

Hello Alex,

 

Thank you for your response

Sorry I was away from the office

Kindly send us a copy of your ID as it the document you used to open the account

In case you would like to introduce your passport as an additional document

Kindly fill the attached form and resend

We look forward to hear from you so we may complete your request

 

Warm regards,

Susan.K.Mati.

Diaspora Banking

 

First she sends this email early morning time at around 5:03 AM,that means she was working night shift and all night long she had ignored the emails sent to her on the 18th and 20th February 2014.

Second she feigns her reason for not responding to the emails that she was away from the office.8 days she was away from the office from the Tuesday of 18th February to Wednesday of 26th February 2014.

Third both emails of 18th and 20th February 2014 allegedly from me to Susan Mati should have sent an automatic out of office automatic messages.According to the email logs provided by Equity Bank there are no automatic out of office messages as she feigns in this email which can only mean she was working during this time.She was waiting to confirm if  the next of kin would visit the diaspora department.She waited for 12 days and when she realized that she was not coming she replied on the 26th February 2014.If on 26th February 2014 she was working nightshift ,Why would she wait for 9 hours only for her to reply close to her time out time?

Fourth she leads the fraudsters in introducing my passport as she even attaches an Introduction Form.When I was applying for internet banking on 28th February 2012 ,my passport copy was entirely disregarded as it was not the document used in opening my account.No introduction form was sent to me and my national ID Card was the only one used to apply for my internet banking.Not one equity bank employee bothered with at least commenting about this introduction form as well as sending me one.But Susan Mati leads the way in introducing my passport up to the point of attaching the form. She anticipates the fraudsters would indicate in their next email that they had not carried the National ID Card.My passport was introduced as a guise and legitimize the fraud as the Equity Bank employee were afraid of the next of kin visiting their office for physical confirmation .

Fifth the attachment in this email is named IDPP introduction.pdf but the one sent to her by the fraudsters  on the 27th February 2014 is named IDPP Introduction.pdf.Just a difference of one capital letter (I). This also points the equity bank employees are the fraudsters as surely no email I have ever received from Susan Mati proving the fraudsters acted on an introduction form other the one sent by Susan mati.

Sixth when search queries were done there are emails from Susan Mati to other recipients between 18th February and 25th February 2014 proving she was working during this time .This compliments my indication that she was waiting to confirm if the next of kin was going to visit their offices and that the fake email sent to me had worked.

 

NINTH EVIDENCE

The fraudsters sends an email to Susan Mati on the 27th February 2014 at 3:57 PM which read as follows:

 

From: Alex Kihika<>

Sent: Thursday ,February 27 ,2014 3:57 PM

To: Susan K.Mati

Subject: RE:FUNDS TRANSFER

Attachments: IDPP Introduction.jpg;My pp.pdf

 

Dear Susan,

 

I only travelled with my passport.

 

Please attached is the filled form and again my passport copy your verification.

Am waiting for the T/T copy for my reference.

 

Thanks

 

(this is supposed to be the message history implying that this is reply)

………………………………..

On Tue,2/25/14,Susan K.Mati<> wrote :

 

Subject:RE:FUNDS TRANSFER

To:””<>

Date:Tuesday,February 25,2014,6:02 PM

 

Hello Alex,Thank you for your

responseSorry I was away from the

officeKindly send us ……………………………………………………… ………. ….. ……………….. ………………………………………………………………… ..

 

First the email looks like its a reply as indicated under subject with the lettering ( RE: ) but according to the email header supplied by the Head of IT, it was a direct email.The fraudsters just added ( RE 🙂 so it that it looks like a reply so the message history indicated under:

Am waiting for the T/T copy for my reference.

Thanks.

The message history was copied from Susan Mati’s emails and then pasted.That is why they change the date or the time to hid the source of their message histories of which was Susan Mati. 

Second the attachment name for my passport copy is changed from alex pp.pdf to My pp.pdf. The passport copy I sent to the bank on the 28th February 2012 was named alex pp.pdf so when the fraudsters attached the passport copy they changed the name to cover their tracks as it will indicate it the same email sent to the bank that was been used.

Third they also change the 26th February 2014 attachment from Susan Mati from  IDPP introduction.pdf to IDPP Introduction.pdf,just a small difference of the capital letter ‘I‘.

Fourth the fraudsters ask for T/T copy for their reference for the second time which they also requested  on their 18th February 2014 email to Susan Mati. Amazingly Susan Mati fails to deliver the TT Copy reference.

Fifth the message history indicates that the email been replied to was sent by Susan Mati on the 25th February 2014 at 6:02 PM while Susan Mati sent this email on the 26th February 2014 at 5:03 AM.How come she could not notice the difference?

The only explanation concerning these coincidences ,is that the fraudsters were going to great lengths to protect Equity Bank employees in charge of these emails as the source of the message histories and they did not mind the emails would be scrutinized by keen eyes as the fraudsters were Equity Bank employees. 

Sixth my USD account is activated based on this email ,yet Susan Mati fails to inform me as the customer that my account has been activated.Why would a sincere senior bank officer take the trouble to activate a dormant account and then fail to inform a customer that his dormant account has been activated.Remember her 9th January 2014 email allegedly to me where she advises that my account is flagged dormant and I have to activate my dormant account for the funds transfer.It took 48 days for my account to be activated and only two lame excuses were given to Susan Mati -Office printer had a technical problem and  I only carried my passport.Its paramount for the bank to inform a customer once an account has been reactivated and the reason I was not informed is because the Susan Mati knew this was an internal fraud and keeping me in the dark was necessary.She knew I did not authorize the funds transfer as well as the activation of the dormant account and so she refrained from informing the account was dormant.

Seventh the passport number indicated on the Passport/National ID Introduction Form is erroneous.The fraudsters did not know that my current passport had the old passport number indicated which required the Introduction Form to be filled both on the old passport line and the new passport line.This proves fraudsters were acting on the 28th February 2012 passport copy I sent to the bank while applying for Internet Banking.They did not know my passport was stamped with the old passport number on the second last page.The second last page only me knew about it . Susan Mati on her 26th February 2014 email allegedly to me, she leads the fraudsters in introducing the passport.She anticipates the next email from the fraudsters would indicate that they only travelled with their passport.She did not wait for the fraudsters to indicate they did not have National ID so that she sends them the Introduction Form.But she attaches the Introduction Form long before she was informed the fraudsters only had their passport . As indicated earlier ,Susan Mati knew I was receiving fake emails and this introduction of my passport is a clear indication she had premeditated everything.She negligently and knowingly failed to inform the customer his account has been activated as she planned to keep me in the dark.

My old passport got lost and so when I was applying for my current passport I had to indicate the previous passport number which is also included in my current passport and stamped by the Passport Control Officer. In case of a lost or stolen passport ,when you apply for a new passport ,you have to include a cheque of 10,000 kshs directed to the Director of Passport Control and its imperative the old passport number be included in the new passport .

That is why the Equity Bank have included old passport number and new passport number respectively in their Introduction Form.The fraudsters had no clue of this old passport number and just assumed its a new passport thereby nullifying the activation of my dormant account on a technical error.This proves the documents used hereby are forged by none other than the Equity Bank employees in charge of these two funds transfers. 

Eighth the last three transactions used as a reference for the activation of my dormant account ,only the bank could have record of them.The last three transactions I executed by transferring money from my usd dollar to my kshs account through internet banking.How could the fraudsters have knowledge of such information?Only Equity Bank employees could know the status of the last three transactions.Second it clearly states when filling the last three transactions you include the date.The last three transactions as filled by the fraudsters only indicate the month and the year when these last three transactions occurred and but the exact days is not indicated.  

 

TENTH COINCIDENCE 

On Susan Mati’s 28th February 2014 email allegedly to me she purports to advise me that my funds transfer has been done.This is from the hard copies of emails that were given to the BFID investigating Officer,plus she includes the TT copy of the funds transfer.But the email indicates no attachment was involved in the email.The email reads as: 

 

From: Susan K.Mati 

Sent: Friday ,February 28 ,2014 1:57 PM

To: ‘Alex Kihika’

Subject: RE:FUNDS TRANSFER

 

Hello Alex,

 

Thank you for your email.

 

This is to advise you that your funds transfer has been done.

 

Please apply for internet banking which will assist you on accessing your account online.Through the online banking,you can get account statement and do funds transfer online among others. … … ……… ………… ………… … … …… ………… …………………………………………………………………………

 

The 27th February 2014 email allegedly from me to Susan Mati was a fake reply meaning the fraudsters just added the word RE to masquerade this email as reply.When you reply to an email the title under subject matter for example – Subject: RE:FUNDS TRANSFER automatically appears.Practically the  27th February 2014 email allegedly from me ,it would mean when Susan Mati replied to this email the subject matter would have appeared as:

Subject: RE:RE:FUNDS TRANSFER 

Under subject will have to be double RE as she was replying to an email with a fake reply.But her 28th February 2014 allegedly to me there is only one RE. This means she deleted one RE on the 28th February 2014 email allegedly to meso that the 27th February 2014 sent to her would appear as a legitimate reply.This proves she knew this was fraudulent email and goes to great lengths to cover up that this email had a fake reply.She not only knew the fraudsters would indicate they only carried the passport,but aids the fraudsters to indicate their emails were legit unto the point of deleting one RE.

 

First of all in this email she advises me to apply for internet banking of which I applied for internet banking on the year 2012 and so this is a pretense by Susan Mati that she did not know I had Internet Banking.On the 18th March 2014 she does a reversal of 500 dollars on my internet banking.So for her to claim I did not have internet banking is a sham as she knew I was not receiving her alleged emails to me but instead I was receiving fake emails.How come the fraudsters knew I had internet banking ,yet a senior officer like Susan Mati has the skills to analyze a dormant account ,has premeditation capability to predict a customer has not carried his national Id card and so sends an Introduction Form in advance before being informed by the customer that he had not carried his national Id card ,fails to inform the customer that his dormant account has been activated,fails to send the TT copy reference and best of all masks the fake replies from the fraudsters to look legit.This denial of my internet banking is a ploy by Susan Mati to demystify her knowledge of the fake emails I was receiving about Internet upgrading.

 

Second the fraudsters in their emails to Susan Mati on the 18th and 27th February 2014 they insisted she sends a TT copy reference.In here she does not send the TT copy reference begging the question why she would fail to send the TT copy reference.She knew this was an internal fraud and the customer was to be kept in the darkness forgetting the need to cover her tracks.But when the BFID Officer went for the emails she includes the TT copy reference in the hard copies she gave to him whereby she attaches the TT copy supposedly thinking we will by pass it as an attachment.Another tactic to disguise her mishaps in this fraud she willingly and cunningly executed.

Third the funds transfer was based on my national ID number which was well indicated on the funds transfer form.When the passport was introduced it automatically nullified the instructions based on my national id number as the authenticating proof.The authenticating document was my passport thereby nullifying the funds transfer based on on my national id.

A senior officer such as Susan Mati was mandated to advise the customer to write new funds transfer based on the passport that was introduced.This negligence by Susan Mati proves she was thinking more as a  fraudster than a bank employee.Ultimately her duplicity roles as a fraudster and as a bank employee  played great role in introducing the passport yet fails to authorize the funds transfer be based on the passport but executes the funds transfer based on the national ID.

 

Fourth my account was activated on the 27th February 2014 which meant also the swift transfer should also have been executed the same day ,but she executes the funds transfer on the 28th February 2014.Why the reluctancy on executing the funds transfer on the 27th February 2014 when she activated my dormant account?She clearly and knowingly failed to send an email informing the customer that his account has been activated and failed to attach a TT copy reference as she knew this was an internal fraud and the customer knew nothing about the funds transfer.

On the 28th February 2014 I received a fake email informing me that my account was dormant and I try to send money to my colleague on the following week.What a coincidence that after my account is activated that Susan Mati waits for me to receive a fake email on the 28th February 2014 advising me to send money to my colleague the next week. The email reads:

 

 

 

On Fri, 2/28/14, Kenyans.Abroad <>  wrote:

 

Subject: Re: Equity Bank Diaspora Banking

To:

Date: Friday, February 28, 2014, 2:18 AM

 

 

EQUITY DIASPORA

BANKING

 

OUR

ESTEEMED CUSTOMERS,

 

 

 DEAR OUR ESTEEMED CUSTOMER, PLEASE BE INFORMED THAT

YOUR ACCOUNT WAS REGISTERED DORMANT, BECAUSE YOU HAVE TAKEN

MORE THAN SIX MONTH WITHOUT DOING ANY TRACNACTIONS ON IT .IT

WILL BE REACTIVATED NEXT WEEK.PLEASE TRY TO SEND MONEY TO

YOUR FRIEND NEXT WEEK.

WE APOLOGIES FOR ANY INCOVENIENCE, BUT IT’S A BANK

POLICY ONCE YOU TAKE MORE THAN SIX MONTH WITHOUT ANY

TRANSACTION YOUR ACCOUNT IS REGISTERED DORMANT

 

Tel: +254 202262486, +254

202262533/9, +254 202262482/3/2 +254711026481/2/3/9,

+254711026533/5, +254732112532

 http://www.ke.equitybankgroup.com/equitydias/

Reply, Reply All or Forward | More

 

The above email clearly illustrates that Susan Mati knew that I was trying to send money to my colleague  in India which I communicated to the bank on the 26th February 2014 through the email address kenyan.abroad @equitybank.co.ke. This is the reason why after activating my dormant account on the 27th February 2014  she waits for one day to make sure I receive the above fake email sent early on the 28th February 2014 giving them ample time for me to ignore Internet banking and the fraudsters to execute the transfer.She clearly knew I did not know anything about the funds transfer and I was focused on sending money to my colleague from India.

 

Every bank in the world has a cut off time for swift transfers which for Equity Bank is from 9:00 AM – 4:00 PM.Her alleged email informing of the funds transfer was sent at 1:57 PM.This TT copy shows that this funds transfer was done at 17:15:59 that is when it was created.That is after one and half  hour after cut off time for swift transfer as dictated by the bank’s rules .After 3 hours from her email informing of the successful funds transfer and after one and quarter hour after cut off time she actually creates the TT copy.This TT copy shows it was created after cut-off time begging the question why after waiting for a whole day ,that is when she activated the account on the 27th February 2014 ,she executes the swift transfer after cut-off time.This is the reason why am asking for the trace messages to be sent to the intermediary and beneficiary banks involved in these two swift transfers.

   

 

ELEVENTH COINCIDENCE

On the 27th February 2014 through internet banking I sent 500 dollars to my colleague Nishan Shetty through my kshs account.After confirming with him ,he informed me that his account was not credited.But when I checked online my account was debited.So we agreed we give time for the transfer to reflect accordingly because this was an international transfer as my colleague’s account was based in India. We perceived this may take some time ,so we agreed we make a follow up each one directed to his bank.

After realizing the account of my colleague was not credited with 500 dollars,I started following up with Equity Bank while my colleague followed up with his bank .He gave me a confirmation in form of an attachment which I emailed to Equity Bank.I wrote to the following emails concerning this 500 dollars misappropriation.The bank in India were  swift to the instructions  of their customer while Equity Bank slept on my instructions for two weeks but are very swift to fraudsters instructions unto the point of anticipating the fraudsters’ next requests.

I wrote 8 emails to the following email addresses about investigating the 500 dollars whereabouts. From 7th march 2014 to 15th march 2014  to , , and last recipient of these emails was christine njihia.

   On the 17th March 2014  Christine Njihia through email informs me that the 500 dollars have been reversed while in real sense the reversal was done on the 18th March 2014 .Christine Njihia sends me an email one day before the actual reversal of 500 dollars on my internet banking.The reversal was done by none other than Susan Mati ,who feigns knowledge of my internet banking.The email from Christine Njihia was sent 23:05 pm kenyan time while susan mati worked on the reversal on the following day 18th march 2014 at 2:44 PM.The email reads as follows:

 

From: Carol Wambui

Sent: Tuesday ,March 18 ,2014 2:44 PM

To: Susan K.Mati

Subject: FW:Amount Not Credited – 0260101215520;alex kihika

Attachments:       [Untitled].pdf

 

As discussed,

Please assist to reverse.

 

Respectfully,

Caroline Mugo

Diaspora Banking.

 

—–Original Message—–

From:Sheila Ingasiani

Sent:Tuesday ,March 18 ,2014 10:53 AM

To:Carol Wambui

Subject:FW:Amount Not Credited – 0260101215520;alex kihika

 

Kindly assist…

 

Kind Regards,

Sheila Ingasiani,

 

—–Original Message—–

From:Alex Kihika [ mailto: ]

Sent:Tuesday ,March 15 ,2014 2:02 PM

To:Christine N.Njihia

Subject:FW:Amount Not Credited 

 

Hallo I sent 500 dollars to Nishan Shetty on the 27th February 2014, ………….…………………………………………………………………………………..

 

First Susan Mati the executioner of the reversal could not stomach informing me of the reversal for her identity to me was to remain anonymous.This is the best indication she knew the alleged emails she was sending me were not received.This is the reason why Christine Njihia was mandated to inform me of the reversal prior to the actual reversal so that Susan Mati would remain anonymous to me.She wanted to confirm that I had been informed, before she actually did the reversal.She knew the emails she alleges to have sent to me I did not receive them and so she mandated Christine Njihia to send this  email on her behalf so that when she did the reversal she would not have to inform me thereby guaranteeing she remain anonymous to me.Also that she would continue feigning her knowledge of my internet banking as will be proved in the second funds transfer she executed on the 22nd April 2014.

Second it was paramount I receive this email informing of the reversal as I was bombarding the Diaspora Department with emails about 500 dollars.I was checking online banking everyday to ascertain that the money was reversed and in the morning of 18th March 2014 then I found out that over 8000 dollars is missing from my online account ,I wrote to , and to about 8383.64 Dollars missing from internet banking account

Then I received a fake email from with a fake bank statement advising me they had a technical problem and to ignore internet banking.This fake email reads:

 

 

 

Me

To

 

Mar 19

I need the latest and updated bank statement showing my recent salary for the period beginning 7th february 2014 and period ending 6th march 2014 amounting to 2,104.16 dollars as stated in dyncorp pay slip statement.The bank statement you sent me shows the salary of january and february.

——————————————–

On Tue, 3/18/14, Kenyans.Abroad <> wrote:

 

Subject: 8383.64 Dollars missing from internet banking account

To:

Date: Tuesday, March 18, 2014, 4:37 AM

 

EQUITY DIASPORA

BANKING

 

OUR

ESTEEMED CUSTOMERS,

  

DEAR OUR ESTEEMED

CUSTOMER.

WE APOLOGIES FOR ANY

INCOVENIENCE,WE ARE EXPERIENCING SOME TECHNICAL PROBLEM WITH

OUR INTERNET BANKING SYSTEM.BUT WE ARE WORKING EVERYTHING IN

OUR POWER TO SOLVE IT.

WE HAVE SOFAR RECEIVED MANY

COMPLIANS FROM OUR CLIENTS.

ATTACHED AGAIN IS YOUR

CURRENT BANK STATEMENT OF YOUR ACCOUNT PLEASE INGORE THE

STATEMENT WHICH IS ONLINE. 

.  

 

Tel: +254 202262486, +254

202262533/9, +254 202262482/3/2 +254711026481/2/3/9,

+254711026533/5, +254732112532

 http://www.ke.equitybankgroup.com/equitydias/

 

 

Below is the email header 

 

From Alex Kihika Wed Mar 19 00:22:26 2014

X-YMail-OSG: _vrtqVUVM1mbfWkawS.C2eLo3cg5ZKp_l9coVXBJRM4_DSh

FgGMLsQCFuUTRMVhoWMJqY0DmlUgHStuj17uIwgRFOT7soTXuhlr3EJfycy0

v8eq.EmjKRMUOAn9vTfoYWUmyCOg546ro1CCcRYDRHSiBqtAI70HFVPmQPlK

 qUH.SeVNLROV_LdAhpsqPi1OqaY2qJ2c8z56AtkOBflAfvUlsniGQE7fMyHa

 09pAcK_llNztgV6DEIHLQH_Yqt5rqvx9uB0Zvg1Q_1fAa4X4rjojYPEXuAJ3

 iBOR5JWfERStvR1UdW8Ox_L6xefdknCj2rpqphpJPYj4_NrjBwus35lvD0.o

 bQPvger.QxvvuqefAs5RjYx.lmnlhQgsEcMfdFFTC4Gf8Bvf8LrLMbC8Q7to

2XtZOH5ZoI6E4kh9npF8x2uzcRETYLUH3OXGGYaQlqF8wauXGmyo3.QROW.N

 z2ZAnDSvycwlqtmI68ZycPvddClUz6ce2IGM9Lp2U3wY9Do9IE7lphThQ_cQ

 .CA1MMmeXcl8eZ_hyRg3BFZRvxl4Zs21gzvMsRAqg2jZP_H9eCzIPY7Q8apx _RClXD4s8h3qDJI8U5_3GHavGMLCzhuXdS5sM7J1UE0sYx4A2aJBei1nbzw_

 82m82jNF8ogxp7hXyVba_2SwLwaR66Ijv9xhDtA–

Received: from [212.21.46.21] by web141703.mail.bf1.yahoo.com via HTTP; Wed, 19 Mar 2014 00:22:26 PDT

X-Mailer: YahooMailClassic/458 YahooMailWebService/0.8.178.641

Message-ID: <>

Date: Wed, 19 Mar 2014 00:22:26 -0700 (PDT)

From: Alex Kihika <>

Subject: I NEED LATEST AND UPDATED BANK STATEMENT

To:

In-Reply-To: <>

MIME-Version: 1.0

Content-Type: text/plain; charset=iso-8859-1

Content-Transfer-Encoding: quoted-printable

Content-Length: 2098

 

Only later, after investigation, when I received all the email traffic between me and the bank did I notice that on the 18th March 2014 countermeasure emails were sent to the bank assuring the bank that I have recovered the money.The emails were sent to and to with the subject as :8383.64 Dollars i have recovered it from internet banking account . 

Third ,the first fraudulent funds transfer was executed on the 28th February 2014,why did it take 20 days to reflect on my internet banking. As I was daily checking on my internet banking and bombarding the bank with emails about 500 dollars I sent to my colleague ,the funds transfer never reflected on my internet banking. But when it reflected on my online account ,am soothed with 500 dollars reversal and a fake email with a fake bank statement about technical problem as the  reason why internet banking is showing discrepancies. Surely this is the biggest coincidences over all the hundreds of coincidences surrounding these two fraudulent transfers.How were the fraudsters able to interfere with my internet banking account so that the first funds transfer did not reflect in my online account?

On the 18th March 2014 when the funds transfer reflects on my account ,a reversal of 500 dollars is executed by a diaspora employee rather than an ebanking employee and cunningly decides to remain anonymous by mandating her colleague to inform me 15 hours prior.While Susan Mati executed the two funds transfers ,she did not mandate Christine Njihia to inform me of the funds transfer but when she executes the reversal she mandates Christine Njihia to inform of the reversal.She knew I did not receive her emails and informing me of this reversal was paramount ,the task is given to Christine Njihia so that Susan Mati would continue remaining anonymous.If she executed the funds transfers sincerely,she would not mind informing me of the reversal.She does the hard work of reversing of 500 dollars on my internet banking and yet a simple task of sending an email to the customer becomes cumbersome.Best of all why inform the customer one day before that a reversal has been done.

Fourth the above email traffic from Sheila Ingasiani to Carol Wambui should be investigated by higher officer than Charles Wanyoike whom has compromised this case from the beginning .Early morning when I opened the christine Njihia email about the reversal of the 500 dollars,  I opened my online account and confirmed that the 500 dollars reflected as per the email and that is when I realized over 8000 dollars is missing.

There is no email from Christine Njihia to Sheila ingasiani begging the question how Sheila accessed Christine emails.The message histories in here are direct copy and paste as is clearly proved by comparison by the message history of 9th January 2014 whereby James Maina is included in the email traffic.This message history is a copy and paste by Carol Wambui to cover their tracks as this reversal was for soothing me to buy into the fake bank statement and advice of ignoring internet banking.They knew the funds transfer were going to reflect on the 18th March 2014 and a reversal of 500 dollars and fake bank statements will be enough to delude me from the truth plus counter measure emails to block investigations into the complaints.

They were ready for me as proved by the email from christine njihia on the 17th March 2014 ,15 hours prior to this email from Carol Wambui to Susan Mati. By 18th March 2014 in the morning, the reversal was already done proving that this email is a sham as well as sham message histories.I had three hour talk with General Manager of Diaspora Banking Miringu Nganga and Head of Security Gerald Munyiri and they promised me they were up to the task of discovering the fraudsters in their midst.I asked them to give investigators one hour ,one laptop and one employee who had access to all the employees who had sent and received emails pertaining to this fraud.He promised this will be done as it was also in his interest to hire good employees  and the bank was going to organize for all the employees  to come on the same day for us to receive the email headers and solve the case.I also requested for a new IT personnel other than Charles Wanyoike and he promised to look into that.But when we came with the investigators for the seventh time,they asked for a court order.When they were served with a court order they had already transferred two employees to Sudan .Why are they protecting fraudsters amongst themselves and possibly hackers ?

Fifth it clearly shows this is an internal job as no fraudsters could have been able to create a fake bank statement  ,anticipate emails from the bank and to the bank with such precision .They blocked/deleted emails from reaching me and sent counter measure emails to the bank stating that they have recovered the money through online banking and also the bank ignored the complaints solely on dubious reasons.The fraudsters emails were regarded highly than my emails as surely on the 7th March 2014 I complained to ebanking about the 500 dollars ,only for them to ignore the complaint.But on the 18th March 2014 they purport to have reacted to one of the 8 emails I sent to the bank about 500 dollars.They feign to have reacted to the 15th March 2014 email I sent to Christine Njihia. Magically, Sheila seems to have received the email from Christine Njihia explaining the delusion of the reversal begging the question who tasked christine njihia who was working on the night of 17th March 2014 while on the 18th march 2014 it shows both carol wambui and susan mati were working day shift.They anticipated on the 18th March 2014 the 8000 dollars will reflect on my internet banking proving they have the capability to trade in customers funds as long as the internet banking did not actualize the true amounts.Mirroring of diaspora customers’ internet  accounts plus fake emails is recipe for trading in customers’ funds and embezzlement.

Sheila Ingasiani works in E-banking department and this reversal was her area of expertise.Why would she assign Diaspora Department to execute an e-banking assignment.Then the assignment is given to Susan Mati  in charge of the two fraudulent transfers ,who mysteriously prior to the above email traffic between Sheila and Carol Wambui on the 18th March 2014 had assigned christine njihia the task of informing me through email that reversal was done one day before the actual reversal. 

When we asked Susan Mati why she declined to send the email herself to the customer about the successful reversal of the 500 dollars,she feigned she was tired and that is why she asked Christine njihia to inform me.She was tired on the 17th March 2014 when she asked Christine Njihia to inform me of the reversal.The email about reversal from christine njihia was sent at night time meaning Christine Njihia was working night shift,while the email from Carol Wambui to susan mati assigning the reversal was on the following day in the afternoon precisely at 2:44 PM.How come she knew one day before she was assigned the job of the reversal that the job will be assigned to her so that 15 hours prior to be assigned the job on the 18th March 2014 at 2:44 PM she tasks christine njihia to send me an email about successful reversal of the 500 dollars?This reversal email from christine njihia was preplanned on the 17th March 2014 as a precursor so that susan mati would remain anonymous and mostly so that I would believe the fake email they had preplanned to send on the 18th March 2014 about ignoring internet banking due to technical errors.

The following email is an indication that this reversal on my internet banking was reserved for the e-banking department and this premonition by susan mati  on the 17th March 2014 about anticipating to be tired on the 18th March 2014 when tasked with reversal  was a well calculated and planned by equity bank employees behind this fraud.This email is from Sheila Ingasiani to me in the year 2012 when I was granted internet banking :

 

From:

Sent: Saturday ,October 27 ,2012 11:48 AM

To:

CC:

Subject: RE:Mail Receipt Acknowledgement

Attachments:      USER ACTIVATION.PDF

 

Hello Alex, Thank you for your email.Please note that your passwords have been activated. Find your user id xxxxxxxxx which you will use to login together with your login password.Attached is the e-banking user guide to help you navigate the site.Kindly revert in case of any challenge or query.Thank you for banking with us.

 

Kind Regards,

Sheila Ingasiani,

Electronic & Mobile Commerce Operations Support

 

From the above email you can clearly comprehend that internet banking is solely for the e-banking department as Sheila even makes a copy to the  e-banking email address . Also check out the title she describes herself with.Now from the email traffic above this email you will deduce that Carol Wambui created a fake email or forged this email about receiving orders from Sheila Ingasiani to assist with the reversal. 

Note that Kenya is behind Afghanistan with 2 hours and by morning time I had confirmed the reversal.Also how could Susan Mati (worked dayshift on 18th February 2014) had communicated to Christine Njihia (worked nightshift 17th March 2014) to send me an email  that reversal was successful.I confirmed early in the morning of 18th March 2014 that the reversal was successful.This means that the above emails from Christine Njihia to Sheila to Carol Wambui and to susan mati are fake emails.Clearly there is a disconnection about how sheila ingasiani got the email from christine njihia as the email traffic proves no email from christine njihia was sent to Sheila Ingasiani.This means Carol Wambui created a fake email about receiving instructions from sheila.

 

This is the reason why physical confirmation of all these alleged emails are paramount as the bank is housing an international syndicate of fraudsters who are  senior officers in Equity Centre.I promised The General Manager of Diaspora Department and Head of Security that the physical confirmation of these disputed emails and their corresponding email headers will apprehend five fraudsters.They promised me physical confirmation of the emails only for them to change their minds and start asking for court orders.From then Equity Bank starts requesting for Court Orders for any data requested for the investigation.This can only mean these fraudsters are sanctioned by the bank or are part of a big syndicate in Equity Centre.  

 

TWELVETH COINCIDENCE 

On the 31st March 2014 according to the email logs from the Head of IT ,the customer care sends me two bank statements which obviously the fraudsters made sure I did not receive.By coincidence these emails are sent on the dead of the night when I was obviously asleep.How was it possible for the fraudsters to anticipate emails sent from the bank at all odd hours and delete them? 

On the 2nd April 2014 I wrote an email to 8 recipients of Equity Bank complaining about the technical problem with the online account.The email read as follows:

 

me

To

Christine N. Bonface James Maina jane nyaga Philip N. Yator

 

 

 

Apr 2, 2014

 

My name is Alex Kihika Mburu working  in Afghanistan with my fellow colleagues from Kenya who also bank with Equity Bank and mostly they rely on online banking.Since I complained to you about my online dilemma about missing my money and you told me internet banking was experiencing some technical problem.So i have extensively talked to most of my kenyan colleagues banking with your bank,and they have not experienced any type of problems with their internet banking.So from the time I complained to you guys upto now its still the same amount I have while you have solicited the best IT companies to programme your internet banking and yet you cannot solve a simple problem with one account.

There is something fishy going on with my acccount and the only security that can satisfy me is reporting this matter to the central bank  and CID for assurance,a simple paper sent to me is not enough satisfy my insecurity and mistrust arising from this problem.

 

 

Reply, Reply All or Forward | More

 

 

 

 

 

By coincidence all the 8 employees who received this email do not react to this email and its only later on the month of October when I asked Caroline Wambui about the reversal of the 500 dollars that she gave a copy of an email allegedly sent by Christine Bonface .This email allegedly sent by Christine Bonface to me on the 5th April 2014 was a reply to an email I allegedly sent to the bank on the 3rd April 2014.I sent my email to the bank on the 2nd April 2014 and not on the 3rd April 2014.The email from Christine Bonface reads as :

 

 

From: Christine N. Bonface

Sent: Saturday ,April 05 ,2014 10:00 PM

To:

Cc: Kenyans Abroad

Subject: RE: MY ONLINE ACCOUNT AMOUNT NOT UPDATED

 

 

Greetings Alex,

 

Trust t6hat this email finds you well.

The funds were credited to your account on 18.03.2014 Please confirm and get back to me in case of any clarification.

Thanks 

Kind regards

Christine Nyambura

Diaspora Banking

 

 

 

 

—–Original Message—–

From:Alex Kihika [ mailto: ]

Sent:Thursday ,April 03 ,2014 12:41 AM

To:ebankinghelpdesk

Cc:Christine N.Bonface;Customer Care

Subject:MY ONLINE ACCOUNT AMOUNT NOT UPDATED

 

My name is Alex Kihika Mburu working  in Afghanistan with my fellow colleagues from Kenya who also bank with Equity Bank and mostly they rely on online banking.Since I complained to you about my online dilemma about missing my money and you told me internet banking was experiencing some technical problem.So i have extensively talked to most of my kenyan colleagues banking with your bank,and they have not experienced any type of problems with their internet banking. Becuase on the 27th February 2014 , I sent 500 dollars to my colleague through my ordinary account through internet banking .But up to now he claims he has not received the money. So from the time I complained to you guys upto now its still the same amount I have while you have solicited the best IT companies to programme your internet banking and yet you cannot solve a simple problem with one account.

There is something fishy going on with my acccount and the only security that can satisfy me is reporting this matter to the central bank  and CID for assurance,a simple paper sent to me is not enough satisfy my insecurity and mistrust arising from this problem.

 

First I did not send this email which Christine Bonface is replying to which resembles the email I wrote on the 2nd April 2014 but now this Christine Bonface  responds to this imaginary email of the 3rd April 2014 and not the 2nd April 2014.Notice the only difference between the 2nd and 3rd April 2014 emails is the following line which was obviously inserted so that the equity bank employees could not investigate the complaint and continue with one more fraudulent transfer:’Becuase on the 27th February 2014 , I sent 500 dollars to my colleague through my ordinary account through internet banking .But up to now he claims he has not received the money.’This line in bold was supposed to refer to the 500 dollars that was reversed on the 18th March 2014 but in my email on the 2nd April 2014 I did not refer to the 500 dollars but the technical problem they promised to solve so that my statement would revert to the actual amounts.

Second this 3rd April 2014 email allegedly from me to the bank does not appear on all the email logs traffic between me and the bank.This is a testimony collaborated by both Head of IT and Investigating officers its not registered in the email logs.Even after searching for the email system of Equity Bank there was no email recorded on the 3rd April 2014 allegedly from my email address.I showed both these emails to the investigating officers Gerald Kanyithia and Hannington Chuba and Gerald Kanyithia referred that this is a cyber technical jurisdiction  and he will only act on the report of the Cyber Crime expert Hannington Chuba. While Chuba said he will write a report after he got all the email headers which the bank has not yet furnished him.  

Third Christine Bonface replies to this email which does not exist meaning she inserted the word ‘RE’ proving all the emails allegedly sent to Susan Mati which claimed to be replies resembled this one of Christine Bonface.She goes to great lengths to create an imaginary email of which she responds to .Subject: RE: MY ONLINE ACCOUNT AMOUNT NOT UPDATED

Fourth this links the bank to this fraud as imaginary emails are being used by employees as well as fake emails proving the bank may have been trading in customers funds via fictitious emails as the mode of instructions.This is why these fraudulent employees are highly protected by the bank and Diaspora Syndicate does not want this scheme exposed.My indication of possible insider trading in customers funds through fake emails and imaginary emanates from this kind of emails .When the employees have technical capabilities of mirroring bogus amounts in customers’ internet banking accounts and fake emails and imaginary emails then insider trading and embezzlement is the end result.  

 

13TH EVIDENCE

 

From: Alex Kihika <

Sent: Tuesday ,April 22 ,2014 5:06 AM

To: Susan K.Mati

Subject: RE:FUNDS TRANSFER

Attachments: alex pp.pdf;TRANSFER 2.jpg; TRANSFER REQUEST.jpg

 

Dear Susan K.Mati,

 

Hoping you are well and good , Welcome back from Easter Holidays.Please transfer US$ 7,800 from my US$ Account No:02601984450590 to my supplier in Hong Kong,attached are the transfer forms and my passport copy for your reference.Below again are the beneficially Bank details for your verification.

 

Beneficiary: Best Source International Company

Bank Name:The Hong Kong and Shanghai Banking Corporation Limited (HSBC)

Account No:819-142340-838

Bank Address:DES VOEUX ROAD CENTRAL ,G/F,CHINA INSURANCE GROUP BUILD,141 DES VOEUX ROAD,SHEUNG WAN,HK

S.W.I.F.T Code : HSBCHKHHHKH

 

Am waiting for the transfer confirmation for my reference .

 

Thanks 

 

From: Susan K.Mati

Sent: Tuesday ,April 22 ,2014 5:06 AM

To: ‘Alex Kihika’

Subject: RE:FUNDS TRANSFER

Hello Alex , 

We are grateful to receive your Email. This is to notify you that we have successfully executed your funds transfer request. To easily manage your account please apply for our internet banking services.On this platform you can access your account and view your account statement from anywhere in the world at any time.You can also transfer funds to other Equity Bank accounts from wherever in the world you may be. 

Thank you for banking with us.

Warm regards,

Susan.K.Mati.

Diaspora Banking 

This email allegedly is masked as a reply but has no message history, and yet the instructions are executed by Susan Mati. This email was a direct email and the possibility of it having RE deludes the recipient its a reply but it does not have a message history.This is negligence  and lack of diligence by Equity Bank.This email is a clear indication that its a fraudulent email .

The first funds transfer was assigned Susan Mati ,who assigned Susan Mati to execute the second transfer?This proves Susan Mati was designated as the officer  to execute this fraud as early 8th January 2014.That is why she executes the second funds transfer without the due process followed.

This fraud is entirely an internal job by well seasoned fraudsters who run an international syndicate able to emblezzle anywhere in the world as proved by this fraud where the first funds transfer was directed to Japan and then the second funds transfer was directed to China .These are employees who know the limits of the Interpol and knew this money cannot be tracked proving its something they are accustomed to. 

If you are truly a bank that cares about its customers and takes fraud seriously ,call for a physical confirmation of the emails and the email headers as requested in the court order.That day as I promised you will apprehend 3 to 5 bank employees as the fraudsters.But these employees are sanctioned to deal in insider trading and embezzlement meaning if they are apprehended and ultimately fired they will whistle blow on all the personnel involved. 

Yours truly  

Alex Mburu 

 

Be Social. Share this Article